Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14
search results - page 2 / 3
»
secrypt 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
11
click to vote
SECRYPT
2008
96
views
Business
»
more
SECRYPT 2008
»
Interactivity for Reactive Access Control
13 years 5 months ago
Download
www.orbac.org
Yehia Elrakaiby, Frédéric Cuppens, N...
claim paper
Read More »
11
click to vote
SECRYPT
2008
82
views
Business
»
more
SECRYPT 2008
»
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks
13 years 5 months ago
Download
research.sabanciuniv.edu
Omer Zekvan Yilmaz, Albert Levi, Erkay Savas
claim paper
Read More »
10
click to vote
SECRYPT
2008
80
views
Business
»
more
SECRYPT 2008
»
A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets
13 years 5 months ago
Download
www.lsi.us.es
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
claim paper
Read More »
6
click to vote
SECRYPT
2008
89
views
Business
»
more
SECRYPT 2008
»
Reputation Management in Grid-based Virtual Organisations
13 years 5 months ago
Download
epubs.cclrc.ac.uk
Álvaro Enrique Arenas, Benjamin Aziz, Gheor...
claim paper
Read More »
18
click to vote
SECRYPT
2008
222
views
Business
»
more
SECRYPT 2008
»
Improved Fuzzy Vault Scheme for Fingerprint Verification
13 years 5 months ago
Download
research.sabanciuniv.edu
Cengiz Örencik, Thomas Brochmann Pedersen, Er...
claim paper
Read More »
« Prev
« First
page 2 / 3
Last »
Next »